Scroll to top button

1D0-571 : CIW: Web Security Associate

1D0-571
CIW: Web Security Associate
ISBN : 978-1-61691-663-3
Gain hands-on expertise in CIW Web Security Associate certification: 1D0-571 exam by CIW Web Security Associate course. CIW Web Security Associate certification is a vendor neutral, entry-level credential designed for IT professionals to validate their skills and competence required in preventing and managing hacker penetration; authentication procedures, encryption standards and implementations; ports and protocols that hackers manipulate; proactive detection and response/reporting methods; and corporate network security policies.

Lessons

uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Exercises Flashcards Glossary

Each lesson comes with Exercises & Flashcards. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts. Glossary defines the key terms.

Exercise Questions
231+
Flashcards
86+
Glossary of terms
86+
Lessons
16+

Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
62+
Full Length Tests
2+
Post-Assessments Questions
107+

Features

Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Live Lab

Live-Lab is an add-on component. Please select it while buying the course. It is a real computer equipment, networked together and conveniently accessible over the Internet using virtualization. A live-lab has equipment such as a computer, server, switch or router in it that a user is free to configure.

The benefits of live-labs are:

  • Exam based practical tasks
  • Real equipment, absolutely no simulations
  • Access to the latest industry technologies
  • Available anytime, anywhere on any device
  • Break and Reset functionality
  • No hardware costs

Here's What You Get

live lab
35+

Hands on Activities

What Is Security?

Elements of Security

Applied Encryption

Types of Attacks

Recent Networking Vulnerability Considerations

General Security Principles

Protocol Layers and Security

Securing Resources

Firewalls and Virtual Private Networks

Levels of Firewall Protection

Detecting and Distracting Hackers

Incident Response

Appendix A: Web Security Associate Objectives and Locations

Appendix B: Internet Security Resources

Appendix C: Commercial Products Used in This Course

Appendix D: Works Consulted

Exam Information

The CIW Web Security Associate course covers various aspects of internet security and its principles such as how to secure your network from unauthorized activity; establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.

Career Prospects
  • Network server administrators
  • Firewall administrators
  • Systems administrators
  • Application developers
  • IT security officers
Exam FAQs
How many questions are asked in the exam?
The exam contains 62 questions.
What is the duration of the exam?
90 minutes
What is the passing score?
76%

Table of Content

Here's What you will Learn

Lesson 1: What Is Security?

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary

Lesson 2: Elements of Security

  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
  • Optional lab

Lesson 3: Applied Encryption

  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
  • Optional Lab

Lesson 4: Types of Attacks

  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
  • Optional Lab

Lesson 5: Recent Networking Vulnerability Considerations

  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
  • Optional Lab

Lesson 6: General Security Principles

  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
  • Optional lab

Lesson 7: Protocol Layers and Security

  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
  • Optional Lab

Lesson 8: Securing Resources

  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
  • Optional Lab

Lesson 9: Firewalls and Virtual Private Networks

  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
  • Optional Lab

Lesson 10: Levels of Firewall Protection

  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
  • Optional Lab

Lesson 11: Detecting and Distracting Hackers

  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary

Lesson 12: Incident Response

  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary

Lesson 13: Appendix A: Web Security Associate Objectives and Locations

Lesson 14: Appendix B: Internet Security Resources

  • General
  • UNIX
  • Windows Server 2003

Lesson 15: Appendix C: Commercial Products Used in This Course

  • Microsoft Windows Server 2003
  • Ubuntu Linux

Lesson 16: Appendix D: Works Consulted

Copyright © 2002-2017 uCertify / All Rights Reserved.